I have used and tested it on multiple x86 platforms.
It does have this: * QA Notice: Package has poor programming practices which may compile * fine but exhibit random runtime failures. * bindresvport.c:71: warning: dereferencing pointer 'sa' does break strict-aliasing rules but runs fine
I created an upstream bug, but this package still works... https://sourceforge.net/tracker/?func=detail&aid=3238605&group_id=249556&atid=1126337
Thanks for reporting your successful test results, assigning to PAM team
Created attachment 268145 [details] /etc/sudoers.d/pam_ssh_agent_auth
I found this package in my local overlay and I had following instructions in pkg_postins(): - elog "Simple steps to make this work (with sudo):" - elog "1. emerge sudo[pam] and update /etc/pam.d/sudo to contain only:" - elog "auth sufficient pam_ssh_agent_auth.so file=/etc/security/authorized_keys" - elog "account include system-auth" - elog "2. Update sudo config to contain:" - elog 'Defaults env_keep += "SSH_AUTH_SOCK"' - elog "3. Put required keys into /etc/security/authorized_keys and try it out!" I'm not sure if pam maintainers want to add it to ebuild, but this may help arch testers :)
http://sourceforge.net/tracker/?func=detail&aid=3267872&group_id=249556&atid=1126338 I was hoping that they would ship drop in file for /sudoers.d/ Also, there is a 0.9.2 release now, we should consider bumping it includes a fix for the QA notice issue...
(In reply to comment #6) > http://sourceforge.net/tracker/?func=detail&aid=3267872&group_id=249556&atid=1126338 > > I was hoping that they would ship drop in file for /sudoers.d/ I meant /etc/sudoers.d/ > > Also, there is a 0.9.2 release now, we should consider bumping it includes a > fix for the QA notice issue... and its actually 0.9.3....
0.9.4 was bumped time ago, please open separate bugs for bumps or the concrete version do you want to get stabilized